Limit search to available items
Book

Title Intelligent multimedia analysis for security applications / Husrev Taha Sencar ... [and others] (eds.)
Published New York : Springer, 2010

Copies

Location Call no. Vol. Availability
 MELB  005.8 Sen/Ima  AVAILABLE
Description x, 402 pages : illustrations ; 24 cm
Series Studies in computational intelligence, 1860-949X ; v. 282
Studies in computational intelligence ; v. 282
Contents Contents note continued: Image Steganalysis / Guorong Xuan -- WBE-Based Anti-collusion Fingerprints: Design and Detection / Wade Trappe -- An Introduction to Robust Transform Based Image Watermarking Techniques / Anthony T.S. Ho -- Watermark-Based Authentication / Mauro Barni
Machine generated contents note: Moving Pixels in Static Cameras: Detecting Dangerous Situations due to Environment or People / Andrea Prati -- Recognizing Interactions in Video / Andrea Cavallaro -- Robust Audio Visual Biometric Person Authentication with Liveness Verification / Girija Chetty -- Multiple Traits for People Identification / Daniel Riccio -- Intelligent Multimedia Analysis for Emerging Biometrics / Ioannis Pitas -- Overview of Audio Forensics / Robert C. Maher -- Printer and Scanner Forensics: Models and Methods / Edward J. Delp -- Privacy Enhancing Solutions for Personal Information Based Multimedia Content Sharing / Konstantinos N. Plataniotis -- Image-Based Sensitive Information Filtering for Teleradiology / Ahmet Ekin -- Detecting Nakedness in Color Images / Pau-Choo Chung -- An Introduction to the Principles and Requirements of Robust Hashing / Felix Balado -- Content-Based Video Copy Detection - A Survey / Husrev Taha Sencar --
Summary The series Studies in Computational Intelligence (SCI) publishes new developments and advances in the various areas of computational intelligence - quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution - this permits a rapid and broad dissemination of research results. --
This is one of the very few books focused on analysis of multimedia data and newly emerging multimedia applications with an emphasis on security. The main objective of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most comprehensive list of research references. The book includes sixteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. Topics covered include dangerous or abnormal event detection, interaction recognition, person identification based on multiple traits, audiovisual biometric person authentication and liveness verification, emerging biometric technologies, sensitive information --
We believe that the comprehensive coverage of diverse disciplines in the field of intelligent multimedia analysis for security applications will contribute to a better understanding of all topics, research, and discoveries in this emerging and evolving field and that the included contributions will be instrumental in the expansion of the corresponding body of knowledge, making this book a reference source of information. It is our sincere hope that this publication and its great amount of information and research will assist our research colleagues, faculty members and students, and organization decision makers in enhancing their understanding for the concepts, issues, problems, trends, challenges and opportunities related to this research field. Perhaps this book will even inspire its readers to contribute to the current discoveries in this immense field. --Book Jacket
filtering for teleradiology, detection of nakedness in images, audio forensics, steganalysis, media content tracking authentication and illegal distributor identification through watermarking and content-based copy detection. --
Bibliography Includes bibliographical references and index
Subject Computer security.
Identification.
Intelligent agents (Computer software)
Identification -- Data processing.
Multimedia systems -- Security measures.
Multimedia systems -- Security
Multimedia systems.
Security systems.
Author Sencar, Husrev T.
LC no. 2010924914
ISBN (alk. paper)